June 25, 2025 – In an impressive turn that has shaken the Blockchain community, Hacken, one of the most respected names in the web 3 cybersecurity, became the last victim of the type of exploit that was built to prevent. During the weekend, computer pirates committed a private key linked to Hacken’s rights, which resulted in the unauthorized creation of almost 900 million HAI tokens in the networks of Ethereum and BNB chains. The consequences? A 99% catastrophic collapse in the price of HAI file and a crisis of trust in one of Crypto’s supposed security guardians.
How to develop hacken
It is the type of irony that no cyber security company wants to face: to be violated in the space it promises to protect. In a detailed statement about X (previously Twitter), Hacken attributed the violation to “Human error”A rare admission to a company that is proud to safeguard digital assets. The attacker exploded a private key linked to an account with minting permits, which allowed them to flood the market with illegitimate tokens.
![]() |
Source: x |
The attack of Mint and Dupo caused an immediate collapse in the value of Hai. What was operating once $ 0.015 collapsed to a shocking minimum of $ 0.000056eliminating almost all market value in minutes. Although the price has been slightly recovered since then, around $ 0.00017 At the time of publication, the damage has been done, both financial and reputable.
The financial and market impact: beyond the loss of $ 250k
While the official hacken report classes the direct losses of the Mint Token attack in Arid $ 250,000The broader impact was much more devastating. Market capitalization for HAI was cut for more than 40%Picture $ 12.7 million at $ 7.2 million Virtually during the night.
The wave of mint of the attackers, which almost Duplicate Hai’s total supplyflooded decentralized exchanges (DEX) and caused a panic sales wave. In the hours, Trust investors, carefully built for years, evaporated.
A violation born during a security update
What makes this trick particularly worrying is the context. The violation occurred in the midst of continuous security updates to the infrastructure of the Hacken Blockchain bridge, updates designed, ironically, to improve protection. The CEO Dyma Budorin revealed that the vulnerability of exploited private key had existed for more than five years, the result of the late implementation of a multi-sig (multi-sig) system.
Budorin’s admission strip cut to the heart of the matter:
“Our bridge was designed when the market and technology were substantially different. Redesigning a deployed bridge means contracting of contracts, a complex legal and technical process. We knew the risk and we possess it.”
How Hacken responded
Immediately afterwards, Hacken acted to contain the damage:
-
Suspension of bridge transactions Through the Ethereum and BNB chain
-
Revocation of mint rights of compromised accounts
-
Public transparency through rapid communication on social networks and his blog
Crucially, Hacken confirmed that the implemer wallet itself remained safe, a detail that avoided even deeper losses. But with the activity of the arrested bridge and the plans for an important revision of the infrastructure now in progress, Hacken faces a long road to recovery.
What follows for Tokens Hai headlines?
Perhaps the most pressing question: What happens to HAI holders trapped in crossfire? Hacken has announced that:
-
The tokens have bought in the affected networks after the attack will not be honored in future tokenomic models.
-
TO Tokens exchange program They will be introduced to replace tokens committed to new and regulated values backed by Hacken’s Equity.
The company’s turn towards regulated security tokens is intended to Restore trust and make sure that the value of HAI is supported by assets and responsibility of the real world. Complete details of this initiative are expected in an upcoming incident report.
The biggest image: a web3 attention call
Hacken’s Breach is the last of a series of high profile feats that have shaken the cryptographic space in 2025. Just a few weeks ago, Goal for the goal He suffered a similar coinage attack, which resulted in fraudulent tokens worth $ 27 million. These incidents highlight a worrying trend: even companies based on security bases are not immune to human errors and process failures.
Source: x |
The fact that Hachen himself had, in his account P1 2025 security reportHe cited access control weaknesses such as the largest threat to web3 only underlines the bitter irony of this attack. In that same report, Hacken estimated that $ 1.6 billion In damage it had been caused by such vulnerabilities only this year.
Can hacen rebuild trust?
Perhaps the biggest challenge that Hacken now faces is not technical, it is reputational. While financial losses can, in theory, recover through careful management and restructuring, hacker credibility stain could persist.
Budorin recognized this in his public speech:
“The loss of cash is considerable, but the reputation coup is much worse. However, it is not a long -term problem: we will learn and recover.”
It remains to be seen if investors, partners and customers will share that optimism. For now, each Movement of Hacken will be analyzed by a criptographic community hungry for guarantees that the lessons have been learned, and errors will not be repeated.
Lessons for cryptographic industry
If hacken’s experience teaches something, it’s that No entity is beyond reproach In the rapid world of blockchain. The violation underlines the need to:
-
Timely adoption of Multi-Sig and other advanced security measures
-
Ongoing, independent Security audits
-
Transparency in the revelation and address of vulnerabilities
As web3 ripe, you also owe your security practices. The cost of failure, as shown by Hacken’s terrible experience, can be immediate and deep.
Final thoughts
The shocking rape of Hacken has sent waves through the cryptocurrency industry, serving as a marked reminder that even digital security guardians can be victims of the weaknesses against which they are assigned to protect. While the company works to rebuild its infrastructure and position, the cryptographic community in general faces an awkward truth: No system is bulletproof, and surveillance should be relentless.
The coming months will be critical, not only for the recovery of Hacken, but for the broader capacity of the ecosystem to evolve against increasingly sophisticated threats.